This repository contains a custom Exploit Protection policy, that should not interfere with most popular apps and day-to-day tasks.
The policy is a mix of several policies (+ custom modifications):
- DISA STIG Exploit Protection v3 (part of the Windows 10 package)
- Microsoft Secure Baseline Exploit Protection policy for 1809 systems (has been removed from later baselines for compatiblity reasons)
- milgradesec's awesome Exploit Protection policy
The following Exploit Protection mitigations are applied system-wide by default:
- Control Flow Guard (CFG):
- Enabled
- Suppress Exports: Disabled
- Strict CFG: Disabled
- Data Execution Prevention (DEP):
- Enabled
- ATL Thunk Emulation: Disabled
- Address Space Layout Randomization (ASLR):
- Force Relocate Images: Enabled
- Require ASLR on DLLs: Disabled
- Bottom-Up ASLR: Enabled
- High Entropy ASLR: Enabled
- Structured Exception Handling Overwrite Protection (SEHOP):
- Enabled
- Heap Protection:
- Terminate on corruption: Enabled
- Strict Handle Checks:
- Enabled
- System Call Restrictions:
- Audit Win32k System Calls
- Audit FSCTL System Calls
- Extension Point Disabling:
- Enabled
- Font Disabling:
- Disable Non-System Fonts
- Payload Restrictions:
- Export Address Filtering (EAF): Enabled
- Export Address Filtering Plus (EAF+): Enabled
- Import Address Filtering (IAF): Enabled
- ROP Stack Pivot Protection: Enabled
- ROP Caller Check Protection: Enabled
- ROP SimExec Protection: Enabled
- Child Process Restrictions:
- Audit Child Process Creation
- Image Load Restrictions:
- Block Low-Label Image Loads
- Block Remote Image Loads
- Prefer System32 Images
- Dynamic Code Restrictions:
- Audit Dynamic Code
- Signed Binary Restrictions:
- Microsoft Signature Not Required
- Store Signed Binaries Not Allowed
- Enforce Module Dependency Signing
- Audit Enforce Module Dependency Signing
- User-mode Hardware-enforced Stack Protection (Shadow Stack):
- Audit
This section details the specific Exploit Protection mitigations applied to individual applications as configured in this policy.
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Strict Handle Checks: Disabled
- Font Disabling: Non-System Fonts Allowed
- Strict Handle Checks: Disabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Disabled
- Font Disabling: Disable Non-System Fonts
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Strict Handle Checks: Enabled
- Child Process Restrictions: Disallow Child Process Creation
- Font Disabling: Non-System Fonts Allowed
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Font Disabling: Disable Non-System Fonts
- Child Process Restrictions: Disallow Child Process Creation
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Font Disabling: Disable Non-System Fonts
- Child Process Restrictions: Disallow Child Process Creation
- Extension Point Disabling: Enabled
- Child Process Restrictions: Disallow Child Process Creation
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Allowed
- Child Process Restrictions: Disallow Child Process Creation
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Allowed
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Child Process Restrictions: Disallow Child Process Creation
- System Call Restrictions: Disable Win32k System Calls
- Strict Handle Checks: Enabled
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Allowed
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Dynamic Code Restrictions: Allowed, Audit Dynamic Code
- Strict Handle Checks: Enabled
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting, Audit Signed Binaries (General)
- Child Process Restrictions: Allowed, Audit Child Process Creation
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Control Flow Guard (CFG): Enabled, Suppress Exports, Strict CFG
- Font Disabling: Disable Non-System Fonts
- Extension Point Disabling: Enabled
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting, Audit Store Signed Binaries
- Dynamic Code Restrictions: Allowed
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting
- Font Disabling: Non-System Fonts Allowed
- Control Flow Guard (CFG): Enabled, Suppress Exports, Strict CFG
- Control Flow Guard (CFG): Enabled, Suppress Exports, Strict CFG
- Dynamic Code Restrictions: Block Dynamic Code
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting
- Font Disabling: Non-System Fonts Allowed
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Require ASLR on DLLs, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- System Call Restrictions: Win32k System Calls Allowed
- Child Process Restrictions: Allowed
- Extension Point Disabling: Enabled
- Dynamic Code Restrictions: Allowed
- System Call Restrictions: Win32k System Calls Allowed
- Strict Handle Checks: Disabled
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Font Disabling: Non-System Fonts Allowed
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Image Load Restrictions: Remote Image Loads Allowed, System32 Images Not Preferred, Low-Label Image Loads Allowed
- Child Process Restrictions: Disallow Child Process Creation
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Data Execution Prevention (DEP): Enabled
- Image Load Restrictions: Remote Image Loads Allowed, System32 Images Not Preferred, Low-Label Image Loads Allowed
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Child Process Restrictions: Disallow Child Process Creation
- Strict Handle Checks: Disabled
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Disabled
- System Call Restrictions: Win32k System Calls Allowed
- Extension Point Disabling: Allowed
- Dynamic Code Restrictions: Allowed
- Control Flow Guard (CFG): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection, EAF Modules (mshtml.dll;flash*.ocx;jscript*.dll;vbscript.dll;vgx.dll;)
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Strict Handle Checks: Disabled
- Control Flow Guard (CFG): Enabled
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Structured Exception Handling Overwrite Protection (SEHOP): Enabled
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting, Audit Store Signed Binaries
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Extension Point Disabling: Enabled
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Require ASLR on DLLs, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- System Call Restrictions: Win32k System Calls Allowed
- Extension Point Disabling: Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images
- Address Space Layout Randomization (ASLR): Force Relocate Images
- System Call Restrictions: Win32k System Calls Allowed
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Extension Point Disabling: Enabled
- Extension Point Disabling: Enabled
- User-mode Hardware-enforced Stack Protection (Shadow Stack): Disabled
- Signed Binary Restrictions: Microsoft Signed Only, Store Signed Binaries Not Allowed by this setting
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Allowed, Audit Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Child Process Restrictions: Allowed, Audit Child Process Creation
- Font Disabling: Disable Non-System Fonts
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Image Load Restrictions: Low-Label Image Loads Allowed, Block Remote Image Loads, System32 Images Not Preferred
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Child Process Restrictions: Allowed
- Font Disabling: Non-System Fonts Allowed
- Dynamic Code Restrictions: Allowed
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Structured Exception Handling Overwrite Protection (SEHOP): Enabled
- Heap Protection: Terminate on corruption
- Extension Point Disabling: Enabled
- Strict Handle Checks: Disabled
- Image Load Restrictions: Block Low-Label Image Loads, Block Remote Image Loads
- Strict Handle Checks: Disabled
- Image Load Restrictions: Block Low-Label Image Loads, Block Remote Image Loads
- Extension Point Disabling: Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Disabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Disabled
- Strict Handle Checks: Disabled
- Strict Handle Checks: Disabled
- Extension Point Disabling: Enabled
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Microsoft Signature Not Required, Store Signed Binaries Not Allowed by this setting
- Extension Point Disabling: Enabled
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Require ASLR on DLLs, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Extension Point Disabling: Enabled
- Child Process Restrictions: Allowed, Audit Child Process Creation
- Dynamic Code Restrictions: Allowed, Audit Dynamic Code
- Font Disabling: Non-System Fonts Allowed
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Child Process Restrictions: Disallow Child Process Creation, Audit Child Process Creation
- Font Disabling: Disable Non-System Fonts
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Address Space Layout Randomization (ASLR): Force Relocate Images, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Dynamic Code Restrictions: Block Dynamic Code
- Signed Binary Restrictions: Enforce Module Dependency Signing
- Child Process Restrictions: Disallow Child Process Creation, Audit Child Process Creation
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Payload Restrictions: Export Address Filtering (EAF), EAF+, Import Address Filtering (IAF), ROP Stack Pivot Protection, ROP Caller Check Protection, ROP SimExec Protection
- Data Execution Prevention (DEP): Enabled
- Address Space Layout Randomization (ASLR): Force Relocate Images, Require ASLR on DLLs, Bottom-Up ASLR, High Entropy ASLR
- Strict Handle Checks: Enabled
- Extension Point Disabling: Enabled
- Child Process Restrictions: Allowed, Audit Child Process Creation
- Dynamic Code Restrictions: Allowed, Audit Dynamic Code
If you suspect that a legitimate use is blocked by this policy, please check in your Event Logs and provide the blocking event details in your Issue ticket.